Transparently Process Confidential Data

Deploy secure containers that cryptographically guarantee their source code and environment as you connect to them.

Transparently Process Confidential Data

Deploy secure containers that cryptographically guarantee their source code and environment as you connect to them.

We work and collaborate with:

CeADAR
UN Big Data
University of Oxford
Rephrain
UCD Dublin
ETH Zurich
OXFO
Allied

Secure Connection ≠ Guaranteed Privacy

Secure connections over the internet can guarantee that the information you sent is received by the recipient server.

There is no guarantee, however, how that information is used.

Introducing Oblivious

Oblivious guarantees how data is processed and who has access to it, assuring the exact source code running.

Leverage native cloud infrastructure to gain attested sign-off from cloud providers before you ever send a packet.

Ensure transparency and governance

From the moment sensitive data arrives through your API gateway, to the time it is erased from your systems, know exactly how the data has been used, by what software and when.

Learn more about governance

Easily combine data and IP from multiple providers

Collaborate within and between organisations by running analyses on joint data without revealing sensitive information. All parties get guarantees about what code is being run without revealing their inputs to each other.

Learn more about collaboration

Host APIs users can trust

Don't let trust, privacy and security concerns get in the way of your next SaaS deal. Build and deploy APIs with Oblivious to give your users total peace of mind.

Learn more about Saas

How it all works

How it all works

Enclaves

Enclaves are servers with special super powers.

No beady eyes are looking at your data

They have very limited input and output abilities, so no one can connect into them easily. This can give you peace of mind. No beady eyes are looking at your data.

Request attestation documents

They also have the ability to request attestation documents signed by the underlying infrastructure. These are signed documents of the hashes of all of the source code and the environment running inside.

Secure handshake

When a client connects to the enclave, this attestation document is shared through a secure handshake, authorising the user and validating that the enclave is doing what it is expected to do.

Payload encryption is maintained

Payload encryption is maintained end-to-end meaning you don't have to trust the host of the enclave.

Oblivious makes it easy

Oblivious makes it easy for you to deploy your servers to enclaves and for your clients to securely connect to them via a native client direct-proxy.

Enclaves

Enclaves are servers with special super powers.

No beady eyes are looking at your data

They have very limited input and output abilities, so no one can connect into them easily. This can give you peace of mind. No beady eyes are looking at your data.

Request attestation documents

They also have the ability to request attestation documents signed by the underlying infrastructure. These are signed documents of the hashes of all of the source code and the environment running inside.

Secure handshake

When a client connects to the enclave, this attestation document is shared through a secure handshake, authorising the user and validating that the enclave is doing what it is expected to do.

Payload encryption is maintained

Payload encryption is maintained end-to-end meaning you don't have to trust the host of the enclave.

Oblivious makes it easy

Oblivious makes it easy for you to deploy your servers to enclaves and for your clients to securely connect to them via a native client direct-proxy.

Build services your way

If you share our dream, drop us a line

Say Hello 👋

Get Started

Deploy a Service

01

Sign in with your GitHub account.

02

Configure a repository, define access control and add build arguments to create a service.

03

Launch the service on our infrastructure or your own.

04

Share connection details with users.

Connect from Anywhere

01

Install the Oblivious client proxy (oblv).

02

Start oblv proxy with details of the enclave you wish to connect to. A secure tunnel is created.

03

Send and receive traffic from your localhost, which will be securely forwarded to the enclave.

Help build a future of trustworthy APIs

Learn more about how to take the greatest advantage of enclaves.

Dev Centre

Connect with the team and like-minded privacy developers in our Discord community. 

Join Discord

Propose new features you'd like to see built and upvote other's ideas. 

Roadmap